UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 202
1.
  • On the Combinatorics of Loc... On the Combinatorics of Locally Repairable Codes via Matroid Theory
    Westerback, Thomas; Freij-Hollanti, Ragnar; Ernvall, Toni ... IEEE transactions on information theory, 10/2016, Volume: 62, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    This paper provides a link between matroid theory and locally repairable codes (LRCs) that are either linear or more generally almost affine. Using this link, new results on both LRCs and matroid ...
Full text

PDF
2.
  • On the Capacity of Quantum ... On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers
    Allaix, Matteo; Song, Seunghoan; Holzbaur, Lukas ... IEEE journal on selected areas in communications, 03/2022, Volume: 40, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity ...
Full text

PDF
3.
  • Constructions and Propertie... Constructions and Properties of Linear Locally Repairable Codes
    Ernvall, Toni; Westerback, Thomas; Freij-Hollanti, Ragnar ... IEEE transactions on information theory, 03/2016, Volume: 62, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    In this paper, locally repairable codes with all-symbol locality are studied. Methods to modify already existing codes are presented. It is also shown that, with high probability, a random matrix ...
Full text

PDF
4.
  • The complete hierarchical l... The complete hierarchical locality of the punctured Simplex code
    Grezet, Matthias; Hollanti, Camilla Designs, codes and cryptography, 2021/1, Volume: 89, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper presents a new alphabet-dependent bound for codes with hierarchical locality. Then, the complete list of possible localities is derived for a class of codes obtained by deleting specific ...
Full text

PDF
5.
  • General Framework for Linea... General Framework for Linear Secure Distributed Matrix Multiplication With Byzantine Servers
    Makkonen, Okko; Hollanti, Camilla IEEE transactions on information theory, 06/2024, Volume: 70, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    In this paper, a general framework for linear secure distributed matrix multiplication (SDMM) is introduced. The model allows for a neat treatment of straggling and Byzantine servers via a star ...
Full text
6.
  • Private and Secure Distribu... Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers
    Li, Jie; Hollanti, Camilla IEEE transactions on information forensics and security, 2022, Volume: 17
    Journal Article
    Peer reviewed

    In this paper, we study the problem of private and secure distributed matrix multiplication (PSDMM) , where a user having a private matrix <inline-formula> <tex-math notation="LaTeX">A ...
Full text

PDF
7.
  • Quantum Private Information... Quantum Private Information Retrieval From Coded and Colluding Servers
    Allaix, Matteo; Holzbaur, Lukas; Pllaha, Tefjol ... IEEE journal on selected areas in information theory, 08/2020, Volume: 1, Issue: 2
    Journal Article
    Peer reviewed

    In the classical private information retrieval (PIR) setup, a user wants to retrieve a file from a database or a distributed storage system (DSS) without revealing the file identity to the servers ...
Full text

PDF
8.
  • CONDENSE: A Reconfigurable ... CONDENSE: A Reconfigurable Knowledge Acquisition Architecture for Future 5G IoT
    Vukobratovic, Dejan; Jakovetic, Dusan; Skachek, Vitaly ... IEEE access, 2016, Volume: 4
    Journal Article
    Peer reviewed
    Open access

    In forthcoming years, the Internet of Things (IoT) will connect billions of smart devices generating and uploading a deluge of data to the cloud. If successfully extracted, the knowledge buried in ...
Full text

PDF
9.
  • Special issue on network co... Special issue on network coding
    Monteiro, Francisco A.; Burr, Alister; Chatzigeorgiou, Ioannis ... EURASIP Journal on Advances in Signal Processing, 04/2017, Volume: 2017, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Future networks are expected to depart from traditional routing schemes in order to embrace network coding (NC)-based schemes. These have created a lot of interest both in academia and industry in ...
Full text

PDF
10.
  • Private Information Retriev... Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers
    Tajeddine, Razane; Gnilke, Oliver W.; Karpuk, David ... IEEE transactions on information theory, 06/2019, Volume: 65, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The problem of private information retrieval (PIR) from coded storage systems with colluding, Byzantine, and unresponsive servers is considered. An explicit scheme using an <inline-formula> <tex-math ...
Full text

PDF
1 2 3 4 5
hits: 202

Load filters